II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001
Group -
The Docker Enterprise Per User Limit Login Session Control in the Universal Control Plane (UCP) Admin Settings must be set to an organization-defined value for all accounts and/or account types.
The UCP component of Docker Enterprise includes a built-in access authorization mechanism called eNZi which can be integrated with an LDAP server and subsequently configured to limit the number of ...Rule Low Severity -
SRG-APP-000014
Group -
TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
The UCP component of Docker Enterprise configures and leverages Swarm Mode for node-to-node cluster communication. Swarm Mode is built in to Docker Engine - Enterprise and uses TLS 1.2 at a minimum...Rule Medium Severity -
SRG-APP-000015
Group -
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
When FIPS mode is enabled on a Docker Engine - Enterprise node, it uses FIPS-validated cryptography to protect the confidentiality of remote access sessions to any bound TCP sockets with TLS enable...Rule High Severity -
SRG-APP-000016
Group -
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the following endpoints: Kubernetes A...Rule Medium Severity -
SRG-APP-000016
Group -
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
SRG-APP-000023
Group -
LDAP integration in Docker Enterprise must be configured.
Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. The eNZi backpla...Rule Medium Severity -
SRG-APP-000033
Group -
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. eNZi provides UCP and DTR with role-based ...Rule Medium Severity -
SRG-APP-000033
Group -
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Both the Universal Control Plane (UCP) and DTR components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. eNZi provides UCP and DTR with role-based ...Rule Medium Severity -
SRG-APP-000033
Group -
Docker Enterprise sensitive host system directories must not be mounted on containers.
Sensitive host system directories such as below should not be allowed to be mounted as container volumes especially in read-write mode. Linux: / /boot /dev /etc /lib /proc /sys /usr Windows: %w...Rule Medium Severity -
SRG-APP-000039
Group -
The Docker Enterprise hosts process namespace must not be shared.
Process ID (PID) namespaces isolate the PID number space, meaning that processes in different PID namespaces can have the same PID. This is process level isolation between containers and the host. ...Rule Medium Severity -
SRG-APP-000039
Group -
The Docker Enterprise hosts IPC namespace must not be shared.
IPC (POSIX/SysV IPC) namespace provides separation of named shared memory segments, semaphores, and message queues. IPC namespace on the host thus should not be shared with the containers and shoul...Rule Medium Severity -
SRG-APP-000090
Group -
log-opts on all Docker Engine - Enterprise nodes must be configured.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
SRG-APP-000108
Group -
Docker Enterprise must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Low Severity -
SRG-APP-000131
Group -
Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.
All packaged components of Docker Enterprise are digitally signed using GPG keys maintained by Docker, Inc. The Docker Engine - Enterprise daemon, itself, is digitally signed. Furthermore, all Dock...Rule Low Severity -
SRG-APP-000141
Group -
The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
Docker considers a private registry either secure or insecure. By default, registries are considered secure. Docker Enterprise includes the following capabilities that are considered non-essential...Rule Medium Severity -
SRG-APP-000141
Group -
On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.
The aufs storage driver is the oldest storage driver. It is based on a Linux kernel patch-set that is unlikely to be merged into the main Linux kernel. aufs driver is also known to cause some serio...Rule Medium Severity -
SRG-APP-000141
Group -
The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
The docker daemon starts a userland proxy service for port forwarding whenever a port is exposed. Where hairpin NAT is available, this service is generally superfluous to requirements and can be di...Rule Medium Severity -
SRG-APP-000141
Group -
Experimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
Avoid experimental features in production. Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the oper...Rule Medium Severity -
SRG-APP-000141
Group -
The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Docker Trusted Registry (DTR) and s...Rule Medium Severity -
SRG-APP-000141
Group -
The Docker Enterprise self-signed certificates in Docker Trusted Registry (DTR) must be replaced with DoD trusted, signed certificates.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Universal Control Plane (UCP) and D...Rule Medium Severity -
SRG-APP-000141
Group -
The option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of UCP and DTR and should be disregard...Rule Medium Severity -
SRG-APP-000141
Group -
The Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Universal Control Plane (UCP) and D...Rule Medium Severity -
SRG-APP-000141
Group -
Periodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of UCP and Docker Trusted Registry (DT...Rule Medium Severity -
SRG-APP-000141
Group -
Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Universal Control Plane (UCP) and D...Rule Medium Severity -
SRG-APP-000141
Group -
An appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.
AppArmor protects the Ubuntu OS and applications from various threats by enforcing security policy which is also known as AppArmor profile. The user can create their own AppArmor profile for contai...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.